Feeds

iPad Mini/Nano beta-tester: Of course it's real

Pocket-size voice fondle-slab's existence confirmed

Seven Steps to Software Security

"El Reg needs to maintain some decorum appropriate for a news source". Oh lord

Others followed up the crying need for enlarged iPads, which could be permanently installed on a desk. For instance commentard Ian Ferguson:

Man, imagine, a MASSIVE iPad on your desk, with a keyboard - it would be just like a common-or-garden iPad in it's dock, standing upright at a slight tilt. The keyboard could connect by Bluetooth, and other things could too, maybe a mouse? Best of all, as you wouldn't need to move it around, you could plug it straight into the mains!

I'm telling you, Apple is the FUTURE.

There was also some complaint about our total lack of journalistic integrity here at the Reg "Laie Techie" comments:

The past few days, I've spotted articles on El Reg which are better suited to The Onion. Is this to be the norm? I like humor as much as the next guy (can't wait for the next episode of BOFH), but El Reg needs to maintain some decorum appropriate for a news source.

One might quibble that the article was factually correct in all important respects, after all: the device described does exist, and so do our sources - we know a man who has occasionally been "close to Cupertino", he just doesn't work for Apple. And it seems fair enough to say that the iPhone is still developing, and thus that its owners are in a sense beta testers.

But we won't even go there, because the story was filed in Bootnotes - which, for anyone who doesn't know, generally means that it is either from a dodgy source, based on wild speculation, outright fictional or all of the above. And you know that when we say those things, this really isn't one to take to the bank.

To round the week off, we'll just note what we consider to be far and away the most wildly unfair criticism of the piece, from an anonymous coward:

1/10 too subtle.

And with that, surely, it's time to be off to the pub. Have a good weekend. ®

*Oh yes, the dread brotherhood of the fanboiyim reaches even into Vulture Towers.

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.